UC&C Solution Deployment and User Adoption Best Practices - Slide 5

Security and UC&C should be planned for together. It is critical to evaluate the security capabilities that exist within network equipment or native security /encryption designed into the communications devices themselves to make new solutions more secure. Organizations must address the key issues of archiving, federation of IM, suitable use policies and overall system security. With archiving, enterprises should know if communications sessions -- especially IM -- will be archived and stored. If so, will it occur centrally or at distributed locations? What impact will this have on data storage systems (NAS, SANs, etc.)? Further, many organizations will wish to federate/XMPP their IM with other companies or with public IM platforms. Doing this can make the enterprise network more vulnerable. To protect against the vulnerabilities, organizations should implement corporate use policies and tighten systems security.

New and advanced unified communications and collaboration (UC&C) technologies offer the enterprise ways to improve business processes and save money. However, many enterprises fail to experience these returns on investment (ROI) due to difficulties integrating the various technologies across multiple platforms and architectures and generating widespread user adoption. Before embarking on such a journey, there are a number of elements enterprises should carefully consider to successfully deploy a UC&C solution.

This slideshow highlights best practices identified by Dimension Data that you should apply to any UC&C implementation project.

As companies broaden their global reach, an important consideration is staying connected with partners and customers. Here are seven key tips to consider when choosing a new service for your organization. ... More >>